About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Cyperpunk Author Responds to Mitnick Charges, Comp


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
A


Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)


Moderators: Jim Thomas and Gordon Meyer ([email protected])


CONTENTS, #3.35 ( October 4, 1991)

Subject: File 1--Moderators' Corner

Subject: File 2--Cyperpunk Author Responds to Mitnick Charges

Subject: File 3--Computer Security Basics review

Subject: File 4--Steam age cyberpunk

Subject: File 5--Errata to "Practical Unix Security"

Subject: File 6--Living with the Law -- A view from Finland

Subject: File 7--Let's Get It Right.

Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)

Subject: File 9--Announcement

Subject: File 10--Cyberspace Conference in Montreal

Subject: File 11--Conference Info and Press Releases


Issues of CuD can be found in the Usenet alt.society.cu-digest news

group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,

and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)

789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),

chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of

Chicago email server, send mail with the subject "help" (without the

quotes) to [email protected].


COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing

information among computerists and to the presentation and debate of

diverse views. CuD material may be reprinted as long as the source

is cited. Some authors do copyright their material, and they should

be contacted for reprint permission. It is assumed that non-personal

mail to the moderators may be reprinted unless otherwise specified.

Readers are encouraged to submit reasoned articles relating to the

Computer Underground. Articles are preferred to short responses.

Please avoid quoting previous posts unless absolutely necessary.


DISCLAIMER: The views represented herein do not necessarily represent

the views of the moderators. Digest contributors assume all

responsibility for ensuring that articles submitted do not

violate copyright protections.


----------------------------------------------------------------------


Date: 4 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: File 1--Moderators' Corner


++++++++++++++++++++++

WIDENER FTP SITE ADDRESS INFO

++++++++++++++++++++++


The latest change for the WIDENER FTP SITE: The IP for

ftp.cs.widener.edu will continue to be the address 147.31.254.132 (not

147.31.254.20). Since it probably wasn't mentioned, the official

transition is now 192.55.239.132 -> 147.31.254.132.


++++++++++++++++++

'ZINE ALERT

++++++++++++++++++


2600: THE HACKER QUARTERLY (summer, '91) is out and contains the the

usual collection of excellent articles. Two of them are especially

worth the sub price. "Where Have all the Hackers Gone," an editorial,

argues that there are as many hackers around as ever, but are becoming

invisible because of the abuse of law enforcement hysteria. A second

piece, a letter by Kevin Mitnick, complains that Hafner and Markoff's

_Cyberpunk_ was slanted against Mitnick because of his "refusal" to

cooperate (see NEWSBYTE reprint this issue). Information on 2600 can

be obtained from [email protected] or by writing to: 2600

Magazine; PO Box 752; Middle Island, NY 11953.


+++++++++++

BOARDWATCH

+++++++++++


We continue to be impressed with BOARDWATCH. Although not CU, it is

the best BBS 'zine out, and the current issue (Sept '91) includes some

first-rate articles on the international BBS scene, featuring boards

in Mexico and an interview with Pete Perkins of JANUS BBS in Tokyo.

There's also a nice piece on how to run a BBS for profit, along with

the usual general news and blurbs of the "straight" BBS scene

nationwide. $36 a year brings 12 issues, and you can sub by writing:

Boardwatch Magazine; 5970 S. Vivian Street; Littleton, CO 80127. Or,

drop a note to the editor, Jack Rickard at [email protected]


+++++++++++++++++++

GERALDO AND THE CU

+++++++++++++++++++


We've received a number of blurbs about the Geraldo schtick last week.

Guests included Craig Neidorf, Emmanuel Goldsten (2600), Don Ingraham

(Marin County, Calif, prosecutor), and, of course, Geraldo himself.

CuD will run a special issue in a few weeks, but it sounds, from the

reports we've received, like the usual Jerry Rivers sensationalism.

We're told that Jerry/Geraldo referred to Craig as the "most notorious

hacker in America," that Ingraham made remarks bordering on slander

(of Craig), and that Craig's primary flaw was that he tried to be

reasonable and display some class in what some described as a "swine

pit of muck and lies." We'll try to extract the transcripts in CuD

3.36.


------------------------------


Date: Tue, 1 Oct 91 23:09 EST

From: "NEWSBYTES" <[email protected]>

Subject: File 2--Cyperpunk Author Responds to Mitnick Charges


JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk

co-author Katie Hafner, in an interview with Newsbytes, has responded

to allegations of fabrication raised by Kevin Mitnick, one of the main

subjects of the book.


Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner

and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first

section of the book called "Kevin: The Dark Side Hacker" to the

activities of Mitnick and his associates, Lenny DiCicco, "Susan

Thunder" and "Roscoe" (the last two names are pseudonyms; the persons

would be interviewed only under the protection of anonymity). Mitnick,

who served a prison term related to his intrusions into Digital

Equipment Corporation's systems, says in a letter to the Summer 1991

issue of 2600: The Hacker Quarterly that the section concerning him

"is 20% fabricated and libelous."


Mitnick, in the letter, suggests that the authors had motivation for

the alleged unfairness. He said "It seems that the authors acted with

malice to cause me harm after my refusal to cooperate. Interestingly,

I did offer to participate as a factual information source if I was

compensated for my time, but the authors refused, claiming it would

taint my objectivity. So, consequently, I declined to cooperate."


Hafner confirmed that Mitnick had refused cooperation after his offer

to meet for pay was rejected but denied that his action caused any

malicious or unfair behavior. She said "I feel that the payment of

interview subjects is completely unethical and I have never been

involved in such a thing and did not intend to start then. We

mentioned in the book that Kevin had refused to cooperate but did not

reveal that he had asked for payment. Since he has not brought the

subject up, both in a call to the Tom Snyder radio show when I was on

and in the 2600 letter, I will confirm the fact that his

non-cooperation was due to our refusal to pay."


Hafner continued "Mitnick's lack of cooperation certainly did not lead

to any malice or bias directed toward him. Everything in the book is,

to the best of my knowledge, factual and we did everything possible to

insure its accuracy. We attempted to get a confirming source for

everything we were told and interviewed dozens of persons for the Dark

Hacker section alone."


'Kevin's lack of cooperation did make the job more difficult and, may

have possibly hurt him. If he had been willing to talk, he would have

had an opportunity to respond to other people's statements about him

but, even though we sent him numerous "return receipt" and overnight

letters asking him to meet with us, he refused. Two cases in point: in

the 2600 letter, he says that we described him as always eating in a

computer room while talking on the telephone to Bonnie, his future

wife. He denies this and says that I was trying to 'paint an unsavory

picture'. It was Bonnie who told us that he was always eating while he

was talking -- we didn't make it up -- and without the ability to

speak to him, we had to choose to go on."


Hafner went on: "The second example is his statement that we said that

he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark

Brown'. Brown says that he has definitely spoken to Mitnick and that he

remembers the calls well and can call to mind details from them. If we

had spoken to Mitnick, he would have had a chance to dispute such

statements.


In response to Mitnick's object to the authors' changing of items that

would possibly identify DiCicco as an unemployment cheat, Hafner said

"That was my call. We tried to protect identities wherever it was

desired. Lenny asked us to change the name and we did just as we

also used public aliases for 'Roscoe' and 'Susan Thunder' at their

request. Contrary to Kevin's statement, Lenny has not been travelling

around with us promoting the book and has received no benefit from it

other than the ability to tell his story as he understands it."


(Barbara E. McMullen & John F. McMullen/19911001)


------------------------------


Date: Tue, 17 Sep 91 11:24:04 CDT

From: [email protected](Bob Izenberg)

Subject: File 3--Computer Security Basics --Review


Just looking at the cover of Computer Security Basics (by Deborah

Russell and G.T. Gangemi, Sr., published by O'Reilly & Associates,

Inc.) tells you that something has changed at the publisher of the

former Nutshell Handbook series. The traditional ORA mascot on the

cover is replaced by an antique key. While such obvious symbolism can

be forgiven, a book about security needs an animal on the cover...

Something ferocious or watchful. Maybe a Doberman. Alas, this book

should only get Spuds McKenzie. Spuds, as you recall, had even less

claim to being a party animal humping a Budweiser Babe's leg. Spuds

was in drag, a female dog labeled as a frat rat. Quel scandal!


O'Reilly has become known for its how-to books for Unix programmers

and programmer wannabees. Their choice of topics has been aimed at

beginning to intermediate Unix users, with occasional surprises such

as the book on Larry Wall's perl language. It's the past grounding in

the practical workings of Unix's many moving parts that makes Computer

Security Basics seem like such a leap into the troposphere. The

intended audience seems to be not the user of small-to-medium Unix

systems, but novices interested in a primer on U.S. Government

security standards. It is a good enough buzzword lexicon to get

somebody started on finding out more if the subject interests them.


There are some things that should be taken with a grain of salt in the

book, however. In the book's discussion of DES, for example, the

authors downplay the concern over the NSA's limiting of the algorithm

to 56 bit encoding by assuring us that no less august a scientific

body than the U.S. Senate has "upheld the integrity of the DES." I

don't mean to come down on one side of the DES standard issue or the

other, and neither do the authors, apparently. The ambiguity that the

reader might sense, in reading of the Senate's approval on one page

and the NSA and ISO failure to adopt the standard on the next, will

hopefully be a spur to do more reading on the subject. It skips

lightly over the RSA algorithm, which is perhaps understandable if the

patent-holders were in court when the book went to press. It also

advocates use of Halon as a fire extinguishing gas, mentioning its

toxicity to people but not its environmental effects. In short, it

reads like a book written after a week spent at a security trade show.

Hey, I've been there... After too many hospitality suites and

pheromone-laced glossy brochures, a pencil sharpener driven by a

Briggs and Stratton engine seems like it might just save the world.

To those whose breathing becomes heavy just at the sight of numbered

paragraphs or RFPs, these will seem to be empty quibbles.


In sum, the book is a start for someone who needs to get the mindset

of government-compliant security standards. For the faithful reader

of other O'Reilly books, it may be akin to a Boston Marathon t-shirt

on a flounder.


------------------------------


Date: Tue, 28 May 91 23:09 EST

From: "Michael E. Marotta" <[email protected]>

Subject: File 4--Steam age cyberpunk


DIFFERENCE ENGINE, the May 1991 "steam punk" novel by William Gibson

and Bruce Sterling, is a humorous and chilling historical fantasy. In

this Britain of 1855 Charles Babbage's successful invention has made

him a lord. Industries and individuals are controlled by ubiquitous

engines. The best programmers call themselves "clackers" and the best

clackers do graphics.


Accelerated into explosive decline by exponential industrialization,

London's ecology collapses in the Great Stink. There are subtler

problems, too, and Lady Ada's mania for gambling is only one of them.


The paleontologist spars with a copper: "If I model a phenomenon, does

that mean I understand it? Or might it be simple coincidence, or an

artifact of the technique? Of course, as an ardent simulationist, I

put much faith in Engine-modeling. But the doctrine can be questioned,

no doubt of it. Deep waters, Fraser! The sort of thing that Hume and

Bishop Berkeley used to thrive on." Sterling and Gibson have modeled

a cybernetic revolution.


The steam-driven engines of Criminal Anthropometry, a section of the

Bureau of Central Statistics, tag everyone in Britain --except for

those people whose records have been expunged on secret orders,

perhaps from Prime Minister Byron himself. More, clackers can, of

course, be bribed, though it is far easier to _get_ information than

to erase it.


And yet, informatics and paleontology are not the whole of science.

One character suffers from tertiary syphilis while his chiropractor

treats him for "railway spine." Parents buy microscopes that allow

clever children to see animicules even though this is considered of no

practical use. While some newer lodgings have crappers, most people

use chamber pots.


The story's commoners wear fabrics with patterns created by engines --

complex, perhaps proto-fractal, some tagged with Lady Ada's name. Like

those weaves, DIFFERENCE ENGINE, provides a woof and warp about life

as it might have been. And yet, all stories are about Today.

(Shakespeare's Julius Caesar was about his England and it will remain

a popular story as long as there is government.) DIFFERENCE ENGINE

reflects the sensibilities of our time. The patterns that evolve from

this story include dark threads and bright. Criminals act as agents

of the legislature and arcane programs crash mighty computers and

radicals become the establishment.


------------------------------


Date: Sat, 28 Sep 91 20:52:41 EST

From: Gene Spafford <[email protected]>

Subject: File 5--Errata to "Practical Unix Security"


(See CUD 3.30 and 3.33 for reviews of this book, and comments.)


O'Reilly & Associates has discovered that in the first printing of

_Practical_UNIX_Security_ by Simson Garfinkel and Gene Spafford (June,

1991) a formatting error caused the grave quotes (`) in the shell

scripts in our final PostScript files to be printed as forward quotes

('). Of course, this breaks the scripts and is certainly not what the

authors, editor, or publisher intended.


An errata sheet is available from the publisher that corrects the

shell script examples and other minor technical errors found in the

first printing. Please call O'Reilly & Associates at 1-800-338-6887

to obtain a copy of this sheet. Alternatively, you may send email to

[email protected], to request a copy of the errata sheet -- be sure to

include your surface mail address.


We apologize for any difficulties these errors may have caused.


------------------------------


Date: Sat, 14 Sep 1991 09:11:06 +0300

From: Jyrki Kuoppala <[email protected]>

Subject: File 6--Living with the Law -- A view from Finland


We live in a crazy society - every citizen is required to know the law

and do nothing against the law, and simultaneously it's illegal for

all practical purposes for citizens to copy the law without paying

royalties to some organizations. This makes it very difficult to make

free dissemination of the law via electronic media possible.


In Finland, the law is published as collections of new laws given out

by the government. I think this is the only official version of the

law. The publications are printed by a company called The State

Printing Center, which is a normal business-oriented company although

owned by the government. The text of the law holds no copyright at

this phase; I'm not sure if the Printing Center claims copyright to

the format of the text.


The trouble with these collections (Suomen S{{d|skokoelma), varying

from a few pages to perhaps dozens of pages is that they're often

`patches' to existing laws which state which paragraphs and sentences

to be changed in a previous version of the law and so it's very

difficult in practice to read the current law based on these. For

example, to get the current patent law you need something like eight

of these collections.


The State Printing Center also publishes other documents. For

example, to get the Finnish copyright law you can buy a book

containing the current copyright law (and IC circuit model protection

law). This book has all the patches collected into one document. But

now, as the Printing Center is a business and the Finnish law has a

`collection copyright', it is not legal to copy this book without the

permission of the Printing Center. They claim copyright for the

collection and perhaps also the layout/appearance of the book. From

their point of view, this is understandable because they don't want

anyone else to begin copying and selling the book - this would deprive

them of some of their income.


There's also another organization publishing the Finnish Law, `Suomen

Lakimiesliitto', Finnish Lawyers' Union. Every two years, they

publish a collection of all the laws. Now, they also want to make

money and so claim copyright for their publication.


I've been doing some investigations on getting the law on-line (for

example to put it available via anonymous ftp) so everyone would get

easy access to it. Now, the State Printing Center has the source for

their publications on-line, and they are even willing to distribute

the source, costing something like $15 / 1000 characters (just an

estimate), covering the costs of processing of the text or something

like that, with extra charges if extra work needs to be done (like for

the patent law, for which they don't have a collection readily done

but several different documents which need to be combined).


The problem with this is that even if I buy the machine-readable text

to the law, I'm not allowed to distribute it without permission from

the Printing Center as they claim collection copyright (also copyright

to the indices and such, but those are not essential). It's possible

that I could get a permission for non-commercial distribution, but

that's problematic - for example, is it then allowed to be put on a

BBS which charges $10 / year as a membership fee? Or a BBS which

charges $1/hour for connect time?


As for the Finnish Lawyers Union, I inquired them about the

availability of all of the law. This was my first phone call to them,

and the person said that they will take appropriate action (I

interpreted that to mean they will sue me ;-) if I distribute the

publication (I talked about OCRing the book and taking only the

portions that contain the law, not any others possibly written by the

Union).


Now, in principle there's no problem with this - all legal and clear,

and I can of course OCR the official version of the law and apply the

patches myself and put it up for anonymous ftp, but that'd be a hell

of a lot of work. I suppose I could even get the text

machine-readable for the processing fees from the Printing Center.

But in practice, this would require a lot of work and then I could

claim copyright for the collection and require licenses for everyone

who uses this - one could argue I'd need to do that in order to get

the money needed for all the work.


The situation also raises some responsibility issues - as the official

law is pretty much unusable, the law enforcement and the government

probably uses the other publications from the State Printing Center

and the Layers' Union. What if there's a misprint in one of these?

What if someone deliberately changes something in the unofficial

versions?


Perhaps we should start lobbying a law to make the copyright for the

law to be something like the GNU copyleft.


------------------------------


Date: Sun, 29 Sep 91 22:21:38 PDT

From: [email protected]

Subject: File 7--Let's Get It Right.


((Moderators' Note--Walter Scott is SysOp of a small semi-public BBS

in Seattle called Writers Happy Hours. Writers Happy Hours is

dedicated to serving literary writers and others with related

interests)).


Now that the dust has settled [just a bit] in the infamous "download

tax" controversy coming out of New York state, it's time to take stock

-- to analyze where we're at and what has happened. This is important

for at least a couple of reasons. (1) Mistakes were made in this

episode of telecomputing history. We must learn from them and not make

them again. (2) We must sort out the real dangers from paranoia.


In 1987, the telecomputing community rose up in an unprecedented

manner to fight a proposed rulemaking which would remove a

communications surcharge exemption for certain electronic data

services. This would have ultimately made it more expensive for people

to access ESP [ENHANCED SERVICE PROVIDER] electronic data services, of

certain types, available by modem. At the time, CompuServe was at the

center of activism -- mostly because CompuServe had a serious stake in

the outcome of the NPRM [NOTICE FOR PROPOSED RULEMAKING] from the FCC.

The NPRM would have implemented a surcharge on various ESPs (including

CompuServe) if the rulemaking went unchallenged.


Modem enthusiasts rallied in opposition to the surcharge from across

the country. Their comments and actions played an important role in

the eventual tabling of the NPRM by the FCC. After the surcharge

incident, people who operate and/or use electronic bulletin board

systems have become hyper-sensitive to any and all references made to

modem-based telecommunications by government infrastructures or

telephone companies. Unfortunately, that hyper-sensitivity has a

disastrous downside.


In the past 3 years, there have been recurring instances where the old

surcharge case is somehow resurrected as though the FCC was "at it

again". The same messages and references appear repeatedly. People

like Jim Eason (cited as a source of information at KGO radio in San

Francisco in many bogus alert files) are likely to be sick of the

constant phone calls asking about a surcharge which Eason or his staff

must explain is a matter of PAST history as looming threats go. Even

the FCC has found it necessary to run ads in major daily newspapers to

dispel rumor and/or innuendo. Also, some members of Congress probably

receive mail on the surcharge in the present, and may receive mail on

it in the future.


As was in evidence through material appearing in CuD 3.34, it seems

the New York state sales tax on prewritten software is yet another

case where the fight/flight syndrome kicks in too easily. There is

clear indication that many ASSUMPTIONS were made as opposed to very

little careful verification of the facts. What makes this worse is

that an ostensibly reputable SysOps organization in New York brought

this matter into prominent exposure without properly investigating the

facts. People panicked, and bureaucrats were besieged with phone calls

from modemers and SsyOps who launched into tirades over a tax on

things that were not and are not taxed in New York state. Legislators

received the same kind of phone calls and mail. Their staff went to

the trouble of contacting bureaucrats and verifying information passed

on to them by irate modem users. Such activity will continue while

messages and text files containing inaccurate information continue to

proliferate.


All this turns out to be as embarrassing as, if not more than, the

recurring surcharge rumors. These incidents generate credibility

issues. It was pointed out to me, by James Morris at the New York

state Department of Taxation & Finance, that we, who use modems and

run bulletin board systems, have a tremendous information network by

which we keep each other informed and initiate action. No greater

compliment can be paid to us as modem users and SysOps.


We, as modem users and SysOps, have tremendous power due to the nature

of the very medium we work and play in. Along with that power comes

an equally awesome responsibility. Responsibility, thy name is

"CREDIBILITY". We *MUST* be credible. We can collectively cry wolf so

many times before those in the position to change things

--politicians, judges, and bureaucrats -- will ignore us. If we're

gonna do it, let's do it right.


Let's be certain we have the FACTS before we sound the battle claxons.

Let's empower each other with information that allows us to easily

contact key sources of information to verify that information. Let's

make certain that provided information is as accurate as possible when

WE are the providers -- straight "from the horse's mouth", as it were.

When it comes to empowering your fellow modem user with critical

information requiring a pointed response in venues not limited to but

generally separate from cyberspace itself, you should put on your

JOURNALIST'S cap and wear it well. Ask and ask again? Verify and

REverify. Whether our tremendous ability to network will be of any

use to us depends on how credible we're assessed to be by those who

generally don't hangout in cyberspace.


Now, on to the second point. The same material in CuD gives us some

gems in-the-rough. They're difficult to see since they're mixed in

with misinformation and associated emotionally oriented calls for

action. One of the dangers in situations, such as the software sales

tax debacle, are tendencies to glide past issues that may be core

issues but require CAREFUL THOUGHT AND ANALYSIS before one can

conceptualize the importance of the issue. This seems to be happening

in the New York state software sales tax debacle. Even though several

people have pointed out a significant truth, which begs for action

every bit as much as the purported "download tax", the BBS community

of New York and the U.S. is not reacting with the tenacity it invoked

over the possibility of taxation on systems supporting upload/download

ratios. Thus, if this had been an attempt to use smoke and mirrors to

deflect people from the REAL issues, it would have worked very nicely.


As you may recall, the New York state Department of Taxation & Finance

has asserted, without contradiction, that there is a longstanding

sales tax on information services. This tax can be, has been, and

probably will be, applied to electronic bulletin board systems in New

York state. NYS T&F also does not claim that upload/download ratios

won't be considered a taxable event IN THE FUTURE. NYS T&F

Regulations Specialist James Morris went to greats pains in

illustrating to me that standing tax codes certainly support such a

FUTURE interpretation. Ergo, the sword precariously swings. Until

modem users and SysOps of New York went into action, NYS T&F knew

little or nothing of the BBS community. They are now ACUTELY aware of

the BBS community and how it functions.


NYS T&F can be likened to the giant in "Jack & The Beanstalk". For a

time, the giant went unaware of Jack's presence. But when he finally

became aware.... Well, we must remember that New York state is

desperate for revenue. Will bulletin board systems become a means to

help fill in financial gaps? To what extent? Should protective

legislation be initiated? Should tax codes be more specific about who

can be taxed and under what circumstances? What about the relationship

of free speech via the various functions of bulletin board systems --

including file exchange of newsletters containing important

information? [Note that CuD makes its way into a lot of download

directories on bulletin board systems across the U.S.] Has anyone

checked statutes in their own state to see if there might be a

sleeping giant about to wake?


------------------------------


Date: Tue, 27 Aug 91 21:36 EDT

From: "Silicon Surfer" <[email protected]>

Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)


Phone Gall

InformationWeek, Aug. 26, 1991, pp.12-13

(By Mary E. Thyfault with Diane Medina and Bob Violino)


AT&T has sued nearly 20 of its large business users for refusing to pay

for calls made by hackers through their corporate telephone In recent

months, the question of whether businesses victimized by phone hackers

should be forced to pay for such calls has stirred acrimonious debate

and prompted numerous actions before the Federal Communications

Commission. Estimates of the corporate monies lost annually to phone

hackers begin at $500 million and go into the billions.


Now an InformationWeek investigation reveals a broad effort by AT&T to

shift this debate to the courts. Among the corporations AT&T has quietly

sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp.,

Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest

such lawsuit uncovered by IW, the United Nations was the victim of

nearly $1 million in unauthorized calls.


While the existence of these lawsuits remains unknown to most large

users, AT&T has n of the facts. What makes this worse is

that an ostensibly reputable SysOps organization in New York brought

this matter into prominent exposure without properly investigating the

facts. People panicked, and bureaucrats were besieged with phone calls

from modemers and SsyOps who launched into tirades over a tax on

things that were not and are not taxed in New York state. Legislators

received the same kind of phone calls and mail. Their staff went to

the trouble of contacting bureaucrats and verifying information passed

on to them by irate modem users. Such activity will continue while

messages and text files containing inaccurate information continue to

proliferate.


All this turns out to be as embarrassing as, if not more than, the

recurring surcharge rumors. These incidents generate credibility

issues. It was pointed out to me, by James Morris at the New York

state Department of Taxation & Finance, that we, who use modems and

run bulletin board systems, have a tremendous information network by

which we keep each other informed and initiate action. No greater

compliment can be paid to us as modem users and SysOps.


We, as modem users and SysOps, have tremendous power due to the nature

of the very medium we work and play in. Along with that power comes

an equally awesome responsibilitn playing legal hardball with corporate customers
for

at least a year, in most cases collecting fees in confidential,

out-of-court settlements. It appears no case has yet reached the trial

stage.


The fact that users back down is no surprise; AT&T is a $36.11 billion

behemoth with a crack legal staff. The mere threat of a lawsuit is

enough to force most firms to pull out their checkbooks.


"Who can afford to go to court with the phone company?" asks Roger

Longtin, counsel for electronics component distributor Avnet Inc. in

Great Neck, N.Y. , which is currently negotiating with AT&T over nearly

$1 million in disputed charges.


AT&T's long-distance rivals MCI Communications Corp. and US Sprint

Communications Co. say they have not sued any users over this issue, and

IW could find no evidence of any legal actions. Such a suit, explains a

spokesman for MCI, "is a good way to lose a customer".


One analyst argues, however, that MCI and Sprint can't afford to be nice

guys much longer. "I'd be surprised if MCI and Sprint didn't file suits

- uncollectibles have been a horrendous problem in the long-distance

business," says John Bain, senior VP at Raymond James & Associates Inc.

in St. Petersburg, Fla. One lawyer who has represented corporate victims

of toll fraud says the out-of-court settlements always involve some

payments by customers. AT&T typically starts negotiations by knocking

15% off the user's bill, he says; that's about the break-even point for

AT&T's profit on long-distance calls, according to analysts. AT&T does

not discuss litigation, a spokesman says.


Some customers are enraged at AT&T and the telecom industry over this

issue. They argue that the carriers and PBX vendors are not providing

enough warning, training, or support. "The carriers should do away with

the attitude of 'The customer should've known,'" charges Tim Honaker CFO

for Dearborn Financial Publishing lnc. in Chicago, which has been hacked

for $65,000. The telcom suppliers "come in with these great technologies

and then say, 'By the way, you gotta figure out how to manage this thing

on your own.' Well, we're not in that business." Suppliers should at

least share in the responsibility and liability for phone fraud charges,

according to victims.


Vendors respond that telecom managers can virtually end fraud by

properly managing their phone systems, particularly remote access

features. Some users agree. Says Jay Silverberg, president of the

National Rolm Users Group, "Although from a technical perspective the

vendor has the responsibility to provide the ability to make a system

secure, it's the user's responsibility to manage it."


The software to monitor such systems isn't cheap, however-about $120,000

on average-and "it can only cut down the hemorrhaging, not eliminate

hacking," says James Ross of Ross Engineering Inc., a software

engineering firm in Sterling, Va. Most victims argue that carriers have

the technology to detect hacking at their fingertips.


While the victims' attorneys say AT&T hasn't improved its security

measures, all the carriers and the major PBX vendors-Northern Telecom,

Rolm Co., and the business telephone unit of AT&T-say they are putting

increasing emphasis on helping users fight phone hacking. AT&T offers

seminars at every user group meeting, for example, and Rolm announced in

April it would begin assigning a security coordinator in each of its 31

branch locations.


Currently, AT&T has seven fulltime staffers charged with educating

customers and investigating fraud cases. Users claim that number is

woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation

in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T

has 40,000 PBX installations and 4 million business long-distance

customers. "If they really want to protect the public, they need to hire

more like 700 people," says Charles Helein, a Washington attorney who

has represented several toll fraud victims. AT&T says it will add three

more staffers next month. Some users even claim AT&T is not devoting

more resources to ending toll fraud because it is making too much money

on such calls-a charge AT&T vehemently denies.


"If you significantly cut phone fraud, you have to wonder what kind of

impact it would have on their revenue," says Thomas Crowe, attorney for

Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in

unauthorized calls.


"That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous

resources to this." The company argues that it is doing more than

required. On a weekly basis, AT&T monitors the three area codes in South

America and Central America that receive the most illegal calls. When a

sudden increase in volume is noted, AT&T tries to notify customers,

reaching about 25%, of them before they themselves notice the break-in.


"I can't tell you that every week we get to everyone, but we attempt to

based on our resources," says Robert Carman, head of AT&T's corporate

security division. Still, the FCC says all complaints filed to date by

users over this issue have involved AT&T.


Frank Chrz, VP of office services at ITT Consumer Financial Corp. in

Minneapolis, says AT&T "was very responsive" in helping him detect and

stop the hackers that penetrated his company's Rolm PBX, racking up

$100,000 in charges. But that cooperation ended when the bill came due

and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and

Rolm's PBX distributor. All four settled out of court. At least two

other users have sued their PBX vendors after being sued by AT&T: New

York City Human Resources Administration sued Northern Telecom Inc., and

Western Diversified Life Insurance Co. in Deerfield, Ill., countersued

AT&T as both its PBX supplier and long-distance carrier.


In another twist, two corporations sued AT&T before AT&T could sue them:

Mitsubishi International Corp. in New York (IW, June 24,p.14) and John

D. Hollingsworth On Wheels Inc. in Greenville, S.C.


Despite all the complex legal maneuvering, every case eventually comes

down to finger-pointing. No one wants to accept responsibility for toll

fraud. Until now, the FCC has typically ruled against users, but

mounting corporate anger may mean the commission will impose some sort

of liability ceiling. What is clear is that users and vendors will have

to work together to solve the problem.


"In no way are we inferring we can catch everything," says Bob Fox,

Sprint's assistant VP of corporate security. "The majority of the time

we're getting to the customer before he knows what's going on. But we're

not going to catch everything every time. It takes teamwork.


"The customer is going to get hurt if we do our thing but he doesn't do

his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino


------------------------------


Date: Thu, 3 Oct 91 11:10:04 EDT

From: [email protected](Storm King ListServ Account)

Subject: File 9--Announcement


NIA & Phrack Inc present:


"It is useless to resist us."


The second annual,

X M A S C O N '91


Where: Houston, TX

When: December 27th-29th 1991


Who: All Hackers, Journalists, Security Personnel and Federal Agents


Well, it's getting closer.. HoHoCon is coming up and we plan on having

the biggest gathering of Hackers ever!


This event is going to be public. Sponsors include members of NIA

Magazine, Phrack Inc, dFx/Neon Knights and cDc.


Hotel and reservation information will be announced at a later date.

Anyone is welcome to attend, and we encourage you to be there.


Keep the Faith & cya' at HoHoCon!


------------------------------


Date: Sat, 21 Sep 91 18:52:56 EDT

From: "Anonymous" <[email protected]>

Subject: File 10--Cyberspace Conference in Montreal


THE THIRD INTERNATIONAL CONFERENCE ON CYBERSPACE

MONTREAL, QUEBEC

MAY 22-23, 1992


Sponsored and hosted by

DEPARTMENT OF COMPARATIVE LITERATURE, UNIVERSITY OF MONTREAL and

GROUP FOR THE STUDY OF VIRTUAL SYSTEMS, U.California, Santa Cruz


ANNOUNCEMENT AND CALL FOR PAPERS


The Third International Conference on Cyberspace will be held May

22--23 1992 at the University of Montreal. This is a call for

abstracts, approximately fifteen of which will be selected for

development and presentation at the Conference. All papers, and a

number of selected abstracts, will be published in Proceedings,

available late 1992.


Abstracts should be between 600 and 1000 words, and are due by

December 15, 1991. Submission of an abstract indicates the

submitter's intention and capability to write and present the

corresponding, full length paper, if chosen.


Participation in the Conference is limited to 140 people in the

following categories:


1. Participants who have been invited to present papers based on

their abstracts. (Limit 15)


2. Participants who have submitted abstracts judged by the Program

Committee to be of particular interest. (Limit 35)


3. Participants with creative and clearly stated interests in the

topic who are involved with work on cyberspace in any capacity.

(Limit 60)


4. Visitors & observers, who are not actively working in the field at

this time but who have expressed interest in the subject. (Limit 30)


Like the First Conference at Austin in 1990, and the Second

International Conference in Santa Cruz in 1991, the Third

International Conference on Cyberspace is not only about the enabling

technology of virtual reality, 3-D user interfaces, networking, data

visualization, or high speed computer graphics, but also the nature

of cyberspace as such, conceived of as an independent realm, a shared

virtual environment whose inhabitants, objects and spaces are data,

but data which is visualized, heard and (perhaps) touched. It seeks

to reach an understanding of how the components of cyberspace already

"under construction" in the development and design of graphic user

interfaces, scientific visualization techniques, video games, CAD,

abstract architecture and architectural design theory, knowledge

navigation, "cyberpunk" discourse, cultural studies, film and

narrative theory, virtual and artificial reality systems, MUDs,

INTERNET, USENET and other networks, groupware, and hypermedia might

someday function together to create a true, public cyberspace, as

well as private, special-purpose cyberspaces.


------------------------------


Date: Thu, 26 Sep 91 00:25:50 MDT

From: [email protected](Marshall Barry)

Subject: File 11--Conference Info and Press Releases


Contact: Terry Travis or Michelle Weisblat

Telephone: (303) 426-1847


IBECC, a non-profit educational, literary and scientific society,

is sponsoring the 1992 International BBSing and Electronic Commu-

nications Conference to be held August 13-16, 1992 in Denver,

Colorado. The theme of IBECC '92 will be "Socially Responsible

Computing."


There will be panels on such diverse topics as "Safe Computing" [How

to Prevent the Spread of Computer Infection], "Why Kelly CAN Read"

[Exploring Computers, BBSing, and Education], and "Staying Alive"

[Computing and the Physically Challenged and Homebound].


Membership in IBECC, including the 1992 annual conference, is $80.00

(US) through September, 1991 and $125.00 from October 1, 1991 through

May, 1992. Membership also includes the IBECC Newsletter, access to

the IBECC Electronic Bulletin Board, and discounts on several

services.


The conference will be held at the Sheraton Denver West Hotel and

Conference Center, Lakewood, Colorado. Room rates start at $62.00

(US + tax) per night; contact the hotel at 1-800-LAKEWOOD, or (303)

987-2000, for reservations.


------------------------------


End of Computer Underground Digest #3.35

************************************

Browse, Scan, Read, Download, Upload, Quit, ?=Menu

(1) General Text:

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS